Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 50 of 123 (0.097 secs)
You searched for: subject:"intrusion"
[1] 2 3     Next    Last
[audio]IUMA: Intrusion
2 Cousins from New Orleans, LA doing what we feel. We have been making music since we discovered our talents at around age 13. We grew up in hard times, no money, broken homes, and bad neighborhoods and all we ever wanted to do was make music. Fast forward to 2003 and I (Robert "4Shay" Foucha, 22) am in the US Coast Guard in Washington state, and Renae "Tipsy" Atkins, 22, is in New Orleans, LA and we talk everyday about the music, just keeping hope alive...
Keywords: Intrusion
Downloads: 10
[audio]stadler - intrusion
stadler - intrusion
Keywords: stadler - intrusion
Downloads: 57
[texts]Intrusion Detection using C4.5: Performance Enhancement by Classifier Combination
Data Security has become a very critical part of any organizational information system. Intrusion Detection System (IDS) is used as a security measure to preserve data integrity and system availability from various attacks. This paper evaluates the performance of C4.5 classifier and its combination using bagging, boosting and stacking over NSL- KDD dataset for IDS. This dataset set consists of selected records of the complete KDD dataset.
Keywords: Intrusion Detection
Downloads: 217
[texts]Context-Aware Intrusion Detection and Tolerance in MANETs
Mobile ad-hoc network (MANET) is a decentralized network where each node will forward the data to other nodes. The major challenge in handling security in MANETs is that the network is not constant and thereby it is difficult to set a constant algorithm for detecting the intrusion. In this work, a context-aware intrusion detection and tolerance module for MANETs is proposed. A node in MANET can be a filtering node or a monitor node...
Keywords: Context-aware; MANET; Intrusion Detection; Intrusion Tolerance
Downloads: 10
[audio]stadler - intrusion 3 - stadler
stadler - intrusion 3
Keywords: stadler - intrusion 3
Downloads: 150
[texts]Detection of suspected nodes in MANET
Mobile ad hoc network (MANETs) is an emergingarea with practical applications. One such field concernsmobile ad hoc networks (MANETs) in which mobile nodesorganize themselves in a network without the help of anypredefined infrastructure. Securing MANETs is an importantpart of deploying and utilizing them, since them are oftenused in critical applications where data and communicationsintegrity in important...
Keywords: MANET; Intrusion detection; AODV
Downloads: 6
[audio]Intrusion Detection Systems
To be viewed in conjunction with the slides on slideshare
Keywords: Intrusion Detection Systems
Downloads: 28
[texts]Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm - Jothi Lakshmi U
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security in recognizing such malicious activity called intrusion. IDSs’ quick and correct detection of unknown intrusions help in reducing damage/loss to the sensitive information. IDS with such quality need to be encouraged...
Keywords: Intrusion Detection; Feature Relevance; Negative Selection; Anomaly Based Intrusion Detection
Downloads: 39
[texts]5. Eng Honeypots For Network Surveillance Niharika - NIHARIKA & RANJEET KAUR
A honeypot is a non-production system which offers sweet bait to the intruders, blackhat community [1] that can enhance the ability of system administrators to identify system vulnerabilities. This paper presents a survey on recent advances in honeypot research from a review of 20+ papers on honeypots and related topics. A recent technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a...
Keywords: Honeypots; Intrusion Detection System; Security; Legal Issues
Downloads: 6
[texts]11. Comp Sci IJCSEITR IDS( INTRUSION DETECTION SYSTEM) For N A Pawar OPaid ( 2)
Intrusion Detection System plays major role in computer security. This paper is describes Different types of attacks occurred to computer system and preventions that are used to avoid all these attacks. In this paper we do not describe details of existing intrusion detection system. Instead, we focus on detection and prevention of attacks. This paper make introduction of IDS for multitier web application.
Keywords: False Positive; Intrusion Detection System; Signature; Vulnerabilities
Downloads: 5
[texts]5. Eng Honeypots For Network Surveillance Niharika - NIHARIKA & RANJEET KAUR
A honeypot is a non-production system which offers sweet bait to the intruders, blackhat community [1] that can enhance the ability of system administrators to identify system vulnerabilities. This paper presents a survey on recent advances in honeypot research from a review of 20+ papers on honeypots and related topics. A recent technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a...
Keywords: Honeypots; Intrusion Detection System; Security; Legal Issues
Downloads: 4
[texts]Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System (IDS) is the mostpowerful system that can handle the intrusions of the computerenvironments by triggering alerts to make the analysts takeactions to stop this intrusion, but the IDS is triggering alertsfor any suspicious activity which means thousand alerts thatthe analysts should take care of it. IDS generate a largenumber of alerts and most of them are false positive as thebehavior construe for partial attack pattern or lack ofenvironment knowledge...
Keywords: Intrusion Detection; False Positives; Alert Reduction
Downloads: 22
Attacks on the nationâs computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic) being a Linux based Intrusion Detection System(LIDs), takes the advantage of the security of a Linux box and secures the other...
Keywords: Intrusion; attack; security; GRANT; LIDS; ijorcs
Downloads: 178
[audio]Stadler - Intrusion v5. New Era. - Stadler
Stadler - Intrusion v5. New Era.
Keywords: Stadler - Intrusion v5. New Era
Downloads: 13
[texts]A Network Attack Classification for Multi Agent System Using Flow Based Intusion Detection System - K.A.VarunKumar, S.Sibi Chakkaravarthy ,G.Saravanan, V.Vetriselvan, P.Dharani, C.Aravind
Intrusion detection system is precious for protecting the entire network from a large range of threats, modern intrusion detection techniques must cope with not only increase the detection rate but also increase the speed of the network line, signature based ids forced to sample meagerly, increasing the probability of harmful traffic flowing towards the network without inspection subsequently, flow based id is attaining awareness as an effective complement...
Keywords: Network Attack; Multi Agent; Intrusion Detection; Classification
Downloads: 30
[texts]Intrusion Detection Using Conditional Random Fields
Intrusion detection systems have become a keycomponent in ensuring the safety of systems and networks.This paper introduces the probabilistic approach calledConditional Random Fields (CRF) for detecting network basedintrusions. In this paper, we have shown results for the issueof accuracy using CRFs. It is demonstrated that high attackdetection accuracy can be achieved by using ConditionalRandom Fields...
Keywords: Intrusion Detection; Conditional Random Fields; Network Security
Downloads: 64
Downloads: 37
[audio]Arseterror - Tribute To The "Mental" Poverty Law Centre - Justin "Christinsultor" Barger
a warning about big government.
Keywords: power electronics; death industrial; field recordings; hate groups; government intrusion
Downloads: 11
In today’s life internet plays important role. All applications and services have made human life very easy. It can be use from basic level to higher level of communication and managing any personal information. In applications, data is increased and complexity of that data is also increased. To resolve this problem multitier web server can be used. There is rapid increase in globalization and use of internet is also increased...
Keywords: False Positive; Intrusion Detection System; Penetrator; Signature; Vulnerabilities
Downloads: 6
[audio]Noosphere Intrusion 005 with mParadis - mParadis
Noosphere Intrusion 005 with mParadis Promo dj set (progressive techno & house music) Please, buy all the tracks you like. Tracklist : 1- Couldn't love you more (Shlomi Aber remix) by The Factory [Toolroom] 2- Choke (dub mix) by Gun & Napalm [Elektro-Lyte] 3- My Affliction by Brandon Invergo [Zuvuya] 4- U are the reason beats by Marko Nastic [Tronic] 5- Love (the Splash dub mix) by Splashfunk & Funky Junction [Sheeva] 6- Ghostrack (radio slave mix) by Tiefschwarz [Souvenir Music] 7- Escape (vers...
Keywords: Noosphere; Intrusion; Progressive house; techno; dj set; mParadis
Downloads: 802
[movies]HITB 2003 Security Conference - Meling Mudin - Putting the Eye on IDS
Meling Mudin - Putting the Eye on IDS Nowadays, a lot of organizations are deploying Intrusion Detection Systems (IDSes) as part of their security infrastructure. In Malaysia, we have seen IDS deployments in the public sector, and also private sector. However, there are a few questions that are always asked by these organizations when deploying IDSes: What is in it for my organization? Unlike other security devices such as firewalls and VPNs, organizations do not see the immediate value of .avi....
Keywords: IDS; intrusion; vulnerabilities; security; hack; security conference; security professional
Downloads: 808
[texts]Kevin Mittnick The Art Of Intrusion The Real Stories
Kevin Mittnick The Art Of Intrusion The Real Stories
Keywords: Kevin Mittnick The Art Of Intrusion The Real Stories
Downloads: 8
[texts]Thracians and Mycenaeans ~ Proceedings of Fourth International Congress of Thracology
Authors: Alexander Fol (1), Jan Best and Nanny de Vries (2) (1) Institute of Thracology, Bulgaria (2) Henry Frankfort Foundation, Netherlands Terra Antiqua Balcanica - E. J. Brill, Sofia - Leiden, 1989, 306 pp.
Keywords: Trojan War; Mycenaean Intrusion into Thrace; Bronze Age Europe
Downloads: 944
[texts]calma :: Calma CARDS Sales Presentation
From the bitsavers.org collection, a scanned-in computer-related document.calma :: Calma CARDS Sales Presentation
Keywords: calma; company; design; intrusion; dap; checks; trace; dimensioning; customer; pad; intrusion error; graphics screen; calma company; pad intrusion; company design; minimum trace; design analysis; trace intrusion; company dap; design station
Downloads: 51
[texts]A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System
Intrusion detection in the internet is an active area of research. Intruders can be classified into two types, namely; external intruders who are unauthorized users of the computers they attack, and internal intruders, who have permission to access the system but with some restrictions. The aim of this paper is to present a methodology to recognize attacks during the normal activities in a system. A novel classification via sequential information bottleneck (sIB) clustering algorithm has been pr...
Keywords: Intrusion Detection; Meta Classifier; Unsupervised clustering; Sequential Information bottleneck clustering
Downloads: 125
[texts]Evaluation of intrusion detection systems (Volume 108) - Ulvila, J.W.
Journal of Research of the National Institute of Standards and Technology
Keywords: intrusion detection; Bayesian statistics; computer security; decision analysis
Downloads: 153
[audio]The Intrusion of Jimmy - P.G. Wodehouse
LibriVox recording of THE INTRUSION OF JIMMY, by P.G. WODEHOUSE. Read by Mark Nelson. The action begins with playboy bachelor Jimmy Pitt in New York; having fallen in love on a transatlantic liner, he befriends a small-time burglar and breaks into a police captain's house as a result of a bet. The cast of characters head to England, and from there on it is a typically Wodehousian romantic farce, set at the stately Dreever Castle, overflowing with imposters, detectives, crooks, scheming lovers an...
Keywords: librivox; literature; audiobook; The Intrusion of Jimmy; Wodehouse; humor; fiction
Downloads: 19,219 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(5 reviews)
[texts]generalmanual 000021334
generalmanual 000021334
Keywords: securenet; sensor; intrusion; step; configuration; figure; click; user; signature; wbi; securenet sensor; securenet wbi; user guide; sensor appliance; appliance user; guide july; intrusion securenet; intrusion pds; pds pilot; revc configuring
Downloads: 26
[texts]Network Security Using Linux/Unix Firewall
Network Security concerns with concept of designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves web filtering, application control, applying policies and rules in your network to protect from unauthorized access. Servers such as application server, web server, Database server are critical devices in your network which require complete Network security for proper working in any organization...
Keywords: untangle firewall; IDS (Intrusion detection system); WIPS (Wireless intrusion protection system); RDP(Remote desktop protocol); DDOS(Distributed denial of service attack )
Downloads: 42
[image]AVC Systems More Than 20 Years In Business Security Systems Serving Toronto And GTA Area
19 Kenview Boulevard, Unit 55Brampton, OntarioL6T 5G6Phone: (905) 840-9484Website: http://www.avcsystems.ca
Keywords: business security systems; Video Surveillance; access control; Integrated security; Intrusion Detection; Fire Protection; ULC Monitoring
Downloads: 2
[audio]MassDEP BWSCAC - September 25 2008 - Indoor Air - Elizabeth Callahan
Presentation on Indoor Air by Elizabeth Callahan to the Massachusetts Department of Environmental Protection's Waste Site Cleanup Advisory Committee. September 25, 2008.
Keywords: MassDEP; Indoor Air; Waste Site Cleanup; Vapor Intrusion; VI; Elizabeth Callahan; tetrachloroethylene; PCE; Perc; background
Downloads: 39
[audio]t2tn032610RMa - dw
End-times, government intrusion, health plans and getting ready to go as the nation of Israel were discussion topics followed by a report from Jamacia by Rav. Ralph Messer
Keywords: End-times; government intrusion; health plans; Israel; Jamacia; Rav. Ralph Messer
Downloads: 7
[audio]T2TN050310KLa - dw
Keywords: End-times; government intrusion; health plans; Israel; Jamacia; Rav. Ralph Messer
Downloads: 7
[texts]18. Sabat Sir IJECIERD ( 1)
We have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don’t have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energylevel of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmi...
Keywords: Cluster Head; Intrusion Detection System; Leader Election; Mobile Ad-Hoc Network
Downloads: 2
[movies]FFWC 252 Intrusion On The Battle - Faith Family Worship Center
Pastor Romeo DelMonte visits us and shares his thoughts on how to be prepared in the spiritual battlefield.
Keywords: Intrusion On The Battle; Romeo; DelMonte; faith; family; ffwc; worship; christianity; faith family worship center
Downloads: 205
[movies]HITB 2003 Security Conference - Shaheezul (Pandir Harris) - IDS over IPV6
Shaheezul (Pandir Harris) - IDS over IPV6 IDS - intrusion detetction system IPV6 - newer IP protocol (versus IPV4) part of research with a local university (presentation material in zip)
Keywords: IDS; intrusion; IPV6; security; hack; vulnerabilities; security conference; security professional
Downloads: 339
[audio]MassDEP BWSCAC January 24 2008 - Indoor Air - Paul W. Locke
Indoor Air Workgroup â Paul Locke discussed the draft Technical Update, "Using Upper Percentile Values Within The Range Of Typical Indoor Air Concentrations At Residences and Schools" Presented at the January 24, 2008 meeting of the MassDEP Waste Site Cleanup Advisory Committee.
Keywords: MassDEP; BWSC; Advisory Committee; Indoor Air; background; vapor intrusion; typical indoor air levels; UPV; Massachusetts; environment
Downloads: 46
[texts]A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System - Elnaz B. Noeparast
There are several methods applied to distributed system security, which have the same absolute view of the intrusion. In their view, an operation could be legitimate or intrusive, which does not have any consistency with the complicated and heterogeneous nature of distributed systems. In this paper, a two level multi-agent model is proposed whose first level determines system’s unsafe behaviors based on anomaly occurrence...
Keywords: Distributed Systems; Intrusion Detection; Multi-Agent Systems; Immune System; ijorcs; ijorcs.org
Downloads: 15
[texts]Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis
The development of Internet protocols are greatlyneeded as the network security becomes one of the mostimportant issues. This brings the need to develop IPv4 intoIPv6 in order to proceed towards increasing the networkcapacity.Now Intruders are considered as one of the most seriousthreats to the internet security. Data mining techniques havebeen successfully utilized in many applications. Manyresearch projects have applied data mining techniques tointrusion detection...
Keywords: Network Security; IPv6 Security; Intrusion Detection; Denial of Service; Data mining
Downloads: 33
[texts]Structural Analysis and Testing of the Inflatable Re-entry Vehicle Experiment (IRVE) - Lindell, Michael C.
The Inflatable Re-entry Vehicle Experiment (IRVE) is a 3.0 meter, 60 degree half-angle sphere cone, inflatable aeroshell experiment designed to demonstrate various aspects of inflatable technology during Earth re-entry. IRVE will be launched on a Terrier-Improved Orion sounding rocket from NASA s Wallops Flight Facility in the fall of 2006 to an altitude of approximately 164 kilometers and re-enter the Earth s atmosphere...
Downloads: 150
[texts]Research on the Application of Internet of Things in Airport Enclosure Intrusion Detection and Alarm System
An airport enclosure intrusion detection and alarm System based on internet of things was presented in this paper, the paper focus on ZigBee wireless communication protocol network, gave out the hardware and software design method of intelligent wireless sensor node through applying CEL ZigBee development kit. Obliquity, tension, video and other data acquisition was completed to provide data basis for the invasion judge and the final decision-making...
Keywords: Internet of Things; Airport enclosure; Intrusion detection and alarm system; ZigBee network
Downloads: 44
[audio]T2TN081010MC - dw
Constitutionalist Nazarene Israelite Mark Call, host of the Mark Call Daily News and "Come Out of Her My People" leads the discussion about government usurpation of rights, our willingness to become slaves,our proper role and responsibility according to Torah and much more as we find out what it means to be "in the world but not of the world" according to Torah - the Bible. Intrusion in private life, confiscation of rights and property, government obstruction and enslavement of it's people are o...
Keywords: Mark Call; Constitution; Thugs; Slavery; intrusion in private life; confiscation of rights; government obstructionn
Downloads: 210
[texts]Elitism Enhancements for Genetic Algorithm based Network Intrusion Detection System - Tanapuch Wanwarang, Machigar Ongtang
Traditional signature-based Network Intrusion Detection Systems (NIDS) suffer from high false negative rate because it can detect an intrusion only if there is an existing rule matching the particular real-time attack. The combination of Genetic Algorithms, network security schemes, and IDS practices has created a model of intelligence system that has the ability to derive new best-fit classification rules from already known attack patterns...
Keywords: Genetic Algorithms; Intrusion Detection System; Network Security; Support-Confidence Framework; Evolutionary Process
Downloads: 37
[texts]A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection - Deepa Guleria, M.K.Chavan
Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and hig...
Keywords: Intrusion Detection System; Conditional Random Fields; Network Security; Decision tree; ijorcs; ijorcs.org
Downloads: 100
[texts]Quasi-One-Dimensional Modeling of Pulse Detonation Rocket Engines - Morris, Christopher I
Pulse detonation rocket engines (PDREs) offer potential performance improvements over conventional designs, but represent a challenging modeling task. A quasi 1-D, finite-rate chemistry CFD model for a PDRE & described and implemented. A parametric study of the effect of blowdown pressure ratio on the performance of an optimized, fixed PDRE nozzle configuration is reported. The results are compared to a steady-state rocket system using similar modeling assumptions.
Downloads: 144
[software]ThreatSentry - http://www.privacyware.com/index_TS.html
This program protects servers running Microsoft Internet Information Services. ThreatSentry continuously collects, analyzes and organizes server events into an evolving baseline of acceptable activity. Each server connection is compared against this baseline to identify and take action against any activity falling outside of acceptable parameters. ThreatSentry protects network weak points created by lapses in patch management, configuration errors, and the use of new and progressive attack techn...
Downloads: 43
[texts]Design & Evaluation of Personal Protection Systems, The
Design & Evaluation of Personal Protection Systems, The
Keywords: system; detection; sensors; sensor; adversary; alarm; protection; security; response; design; physical protection; response force; protection system; entry control; design physical; alarm assessment; nuisance alarm; intrusion sensors; alarm communication; intrusion detection
Downloads: 750
[audio]MassDEP Waste Site Cleanup Advisory Committee Meeting - Oct 27 2011 - MassDEP Bureau of Waste Site Cleanup
Audio from the October 27, 2011 meeting of the Massachusetts Department of Environmental Protection (MassDEP), Bureau of Waste Site Cleanup (BWSC) Advisory Committee. Location: One Winter Street, Boston, Massachusetts Time: 9:30 AM Topics include Regulatory Reform items, Natural Resource Damage (NRD), Vapor Intrusion and Brownfields.
Keywords: MassDEP; BWSC; Waste Site Cleanup; hazardous waste; contamination; cleanup; remediation; site assessment; advisory committee; NRD; brownfields; vapor intrusion; Bouchard; 2011
Downloads: 35
[audio]MassDEP-AdvisoryCommittee-BWSC-June262008-Indoor-Air - Elizabeth Callahan
Presentation at the June 26, 2008 MassDEP Waste Site Cleanup Advisory Committee meeting. Elizabeth Callahan described two review drafts: âIndoor Air Threshold Values for the Evaluation of a Vapor Intrusion Pathwayâ and âTypical Indoor Air Concentrationsâ, are availablefor comment on the BWSC website.
Keywords: Indoor Air; BWSC; Advisory Committee; Massachusetts; MassDEP; Waste Site Cleanup; Department of Environmental Protection; volatilization; background; vapor intrusion; vapor
Downloads: 41
[texts]Buildings 933 and 937 Vapor Intrusion Assessment and Field Sampling Report Presidio of San Francisco, California - Erler & Kalinowski, Inc.
This report presents the methods and results of a vapor intrusion assessment conducted at Building 937 and additional sampling for volatile organic compounds in the subsurface at Buildings 933 and 937. This work was conducted in response to an 8 August 2005 request by the Department of Toxic Substances Control (DTSC) to conduct a vapor intrusion analysis at Building 937.
Keywords: environmental remediation; Building 933; Building 937; Crissy Field; soil contamination; groundwater contamination; petroleum contamination; vapor intrusion assessment; field sampling
Downloads: 490
[1] 2 3     Next    Last
Advanced search

Group results by:

> Relevance

Terms of Use (10 Mar 2001)